General

  • Target

    488446f7510d2914a58c62dc96263b40d42573718cfe07979c672e6a6517c620

  • Size

    116KB

  • MD5

    aa1dac371acb96fa7a8d68d3fa11946a

  • SHA1

    a6acdbd8f17107c840f1fcdc5e5674558d2db2a7

  • SHA256

    488446f7510d2914a58c62dc96263b40d42573718cfe07979c672e6a6517c620

  • SHA512

    9fe78220c7eb15983553329963fc061be3cd03cf0d8db18d494f29fc27d18eb827e6b2c7d220ca9d8b74dfee4506c83f14e9f9618af61b00563af45f08228c95

  • SSDEEP

    3072:WxUsSffQYRK2Nsc6YLTnpPrunNrrjv69ny6JP/KTiFi:WxxaQqeuTnFuFv69ny6JHKTiFi

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 488446f7510d2914a58c62dc96263b40d42573718cfe07979c672e6a6517c620
    .elf linux x86